Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 11, Issue 37;   September 14, 2011: Telephonic Deceptions: I

Telephonic Deceptions: I

by

People have been deceiving each other at work since the invention of work. Nowadays, with telephones ever-present, telephonic deceptions are becoming more creative. Here's Part I of a handy guide for telephonic self-defense.
The Garden Tiger moth, Arctia caja

The Garden Tiger moth (Arctia caja). To avoid predation by bats, this moth has a furry body that absorbs sound, including the sound of the bat sonar. But this moth takes a further step: it emits clicks that jam bat sonar. In effect, the Garden Tiger moth deceives the bat by aggressive counter-measures. Its approach is analogous to the deception tactics humans use to deceive each other using telephones, in that both the moth and the human send intentionally confusing signals. Bats and moths have been engaged in this sensory "arms race" for millions of years. Humans have been engaged in telephonic deception for less than 100 years. It's reasonable to suppose that human deception tactics will eventually become far more sophisticated than they now are. View a video of bat/moth interactions.

Photo courtesy Wikimedia.

People who suddenly reach into a pocket or purse and pull out a phone to answer it might not actually be doing what they appear to be doing. Maybe they just don't want to talk to you.

According to a study entitled, "Americans and their cell phones," by Pew Research, released August 15, among U.S. adults surveyed, 13% acknowledge having used their cell phones at least once in the past 30 days to avoid interacting with someone. I suspect that percentage would have been much greater if the survey had included other motivations, such as wanting to appear to be important or busy, showing off a new high-status phone, wanting to move to a more private setting where one is less likely to be observed, or any of dozens of other motivations.

Since deceivers are not always clever enough to pull off their deceptions, you can sometimes detect the deception if you're aware of the more common mistakes they make. For example, a typical error associated with the I'm-answering-my-phone ploy described above is forgetting to disable the ring tone. Nothing looks sillier than talking into a cell phone that suddenly begins to ring. When you see this happen, it's probable that a deception was underway. And if you suspect this deception, you can test your conjecture by calling the person on your phone, if you have their number. If you hear the physical phone ring, then it wasn't engaged.

Here is Part I of a little catalog of examples of deceptions involving the telephone, and some methods for detecting them.

Circumventing personal cell phone bans
When using personal cell phones is banned at work, some use this ploy: Make the call, put the cell phone on speaker or use a blue tooth earpiece, then pick up the desk phone without making a call on it, and continue the conversation on the cell phone. They then appear to be speaking on the desk phone.
A typical mistake is to forget to warn, or fail to warn, the called party that the cell phone is on speaker.
Phone borrowers
Someone If you need an excuse to leave a
meeting early, having an actual
call come in on your phone
is usually good enough
who wants to borrow your phone to make a call might actually make a call, but they might also want to have a look at your recent calls.
Borrowers rarely forget that you can watch what they do. Lending someone your phone is not a good idea, but at least you'll know what number they called.
Faking incoming calls
If you need an excuse to leave a meeting early, having an actual call come in on your phone is usually good enough. With a scripting language like AppleScript, and a Skype account, you can easily arrange it.
Common mistake: forgetting to blank the screen and mute the sound of the computer that runs the script. Anyone passing by, with enough knowledge, can easily figure out what's happening.

We'll explore a few more tactics, and some serious security concerns, next time.  Telephonic Deceptions: II Next issue in this series  Go to top Top  Next issue: Telephonic Deceptions: II  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenDJpmhgyaDTwBQXkhner@ChacmGoYuzfZpOvDQdRkoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

A section of the Rose Kennedy Greenway in Boston in 2008The Politics of the Critical Path: I
The Critical Path of a project or activity is the sequence of dependent tasks that determine the earliest completion date of the effort. If you're responsible for one of these tasks, you live in a unique political environment.
Red Ball Express troops stack "jerry cans" used to transport gasoline to front-line units during World War II.Inappropriate Levels of Regard
The regard we have for others as people is sometimes influenced by the regard we have for the work they do. Confusing the two is a dangerous error.
Benches at the beachImplicit Interrogation Tactics
When one person tries surreptitiously to extract information from another at work, an implicit interrogation is taking place. Here are seven tactics that people use to interrogate others without revealing what they're doing.
A fictional tornado striking ManhattanBad Trouble: Misdirection
When Bad Trouble develops at work we have a chance to see what our organizational cultures are made of. Many of our colleagues respond constructively. When they don't, misdirection tactics are popular. Here's a little catalog of misdirection responses.
NASA's Mars Climate Orbiter, which was lost on attempted entry into Mars orbitWould Anyone Object?
When groups consider whether to adopt proposals, some elect to poll everyone with a question of the form, "Would anyone object if X?" It's a risky approach, because it can lead to damaging decisions that open discussion in meetings can avoid.

See also Workplace Politics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

Grissom, White, and Chaffee in front of the launch pad containing their AS-204 space vehicleComing May 14: Working with the Overconfident
A cognitive bias known as the Overconfidence Effect causes us to overestimate the reliability of our judgments. Decisions we make based on those judgments are therefore suspect. But there are steps we can take to make our confidence levels more realistic, and thus make our decisions more reliable. Available here and by RSS on May 14.
A Strangler Fig in AustraliaAnd on May 21: Mismanaging Project Managers
Most organizations hold project managers accountable for project performance. But they don't grant those project managers control of needed resources. Nor do they hold project sponsors or other senior managers accountable for the consequences of their actions when they interfere with project work. Here's a catalog of behaviors worth looking at. Available here and by RSS on May 21.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenDJpmhgyaDTwBQXkhner@ChacmGoYuzfZpOvDQdRkoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Bluesky, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.